49 research outputs found

    Unequal Error Protected JPEG 2000 Broadcast Scheme with Progressive Fountain Codes

    Full text link
    This paper proposes a novel scheme, based on progressive fountain codes, for broadcasting JPEG 2000 multimedia. In such a broadcast scheme, progressive resolution levels of images/video have been unequally protected when transmitted using the proposed progressive fountain codes. With progressive fountain codes applied in the broadcast scheme, the resolutions of images (JPEG 2000) or videos (MJPEG 2000) received by different users can be automatically adaptive to their channel qualities, i.e. the users with good channel qualities are possible to receive the high resolution images/vedio while the users with bad channel qualities may receive low resolution images/vedio. Finally, the performance of the proposed scheme is evaluated with the MJPEG 2000 broadcast prototype

    Decentralised distributed fountain coding: asymptotic analysis and design

    Get PDF
    A class of generic decentralised distributed fountain coding schemes is introduced and the tools of analysis of the performance of such schemes are presented. It is demonstrated that the developed approach can be used to formulate a robust code design methodology in a number of instances. We show that two non-standard applications of fountain codes, fountain codes for distributed source coding and fountain codes for unequal error protection lie within this decentralised distributed fountain coding framework

    Coded Slotted ALOHA with Varying Packet Loss Rate across Users

    Full text link
    The recent research has established an analogy between successive interference cancellation in slotted ALOHA framework and iterative belief-propagation erasure-decoding, which has opened the possibility to enhance random access protocols by utilizing theory and tools of erasure-correcting codes. In this paper we present a generalization of the and-or tree evaluation, adapted for the asymptotic analysis of the slotted ALOHA-based random-access protocols, for the case when the contending users experience different channel conditions, resulting in packet loss probability that varies across users. We apply the analysis to the example of frameless ALOHA, where users contend on a slot basis. We present results regarding the optimal access probabilities and contention period lengths, such that the throughput and probability of user resolution are maximized.Comment: 4 pages, submitted to GlobalSIP 201

    Buffer-Based Distributed LT Codes

    Full text link
    We focus on the design of distributed Luby transform (DLT) codes for erasure networks with multiple sources and multiple relays, communicating to a single destination. The erasure-floor performance of DLT codes improves with the maximum degree of the relay-degree distribution. However, for conventional DLT codes, the maximum degree is upper-bounded by the number of sources. An additional constraint is that the sources are required to have the same information block length. We introduce a DD-bit buffer for each source-relay link, which allows the relay to select multiple encoded bits from the same source for the relay-encoding process; thus, the number of sources no longer limits the maximum degree at the relay. Furthermore, the introduction of buffers facilitates the use of different information block sizes across sources. Based on density evolution we develop an asymptotic analytical framework for optimization of the relay-degree distribution. We further integrate techniques for unequal erasure protection into the optimization framework. The proposed codes are considered for both lossless and lossy source-relay links. Numerical examples show that there is no loss in erasure performance for transmission over lossy source-relay links as compared to lossless links. Additional delays, however, may occur. The design framework and our contributions are demonstrated by a number of illustrative examples, showing the improvements obtained by the proposed buffer-based DLT codes.Comment: 14 pages, 17 figures, submitte

    A polar codes-based distributed UEP scheme for the internet of things

    Get PDF
    The Internet of Things (IoT), which is expected to support a massive number of devices, is a promising communication scenario. Usually, the data of different devices has different reliability requirements. Channel codes with the unequal error protection (UEP) property are rather appealing for such applications. Due to the power-constrained characteristic of the IoT services, most of the data has short packets; therefore, channel codes are of short lengths. Consequently, how to transmit such nonuniform data from multisources efficiently and reliably becomes an issue be solved urgently. To address this issue, in this paper, a distributed coding scheme based on polar codes which can provide UEP property is proposed. The distributed polar codes are realized by the groundbreaking combination method of noisy coded bits. With the proposed coding scheme, the various data from multisources can be recovered with a single common decoder. Various reliability can be achieved; thus, UEP is provided. Finally, the simulation results show that the proposed coding scheme is viable

    Multi-user video streaming using unequal error protection network coding in wireless networks

    Get PDF
    In this paper, we investigate a multi-user video streaming system applying unequal error protection (UEP) network coding (NC) for simultaneous real-time exchange of scalable video streams among multiple users. We focus on a simple wireless scenario where users exchange encoded data packets over a common central network node (e.g., a base station or an access point) that aims to capture the fundamental system behaviour. Our goal is to present analytical tools that provide both the decoding probability analysis and the expected delay guarantees for different importance layers of scalable video streams. Using the proposed tools, we offer a simple framework for design and analysis of UEP NC based multi-user video streaming systems and provide examples of system design for video conferencing scenario in broadband wireless cellular networks
    corecore